Sciweavers

712 search results - page 72 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
AGENTS
1999
Springer
15 years 2 months ago
Shopbot Economics
Abstract. Shopbots are agents that search the Internet for information pertaining to the price and quality of goods or services. With the advent of shopbots, a dramatic reduction i...
Jeffrey O. Kephart, Amy R. Greenwald
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 2 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
CSFW
1998
IEEE
15 years 2 months ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider
SAFECOMP
1998
Springer
15 years 2 months ago
Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systems
The main focus of this paper is the problem of ensuring safety properties such as timeliness in safety critical systems. We introduce the OASIS model and its associated techniques ...
Vincent David, Jean Delcoigne, Evelyne Leret, Alai...
CCS
2006
ACM
15 years 1 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov